CVE-2022-35291

8.1 HIGH

📋 TL;DR

This vulnerability in SAP SuccessFactors allows authenticated users with standard privileges to perform administrative actions on attachments via misconfigured mobile APIs. Attackers can read and write attachments in Time Off, Time Sheet, EC Workflow, and Benefits modules, compromising data confidentiality and integrity. Organizations using affected SAP SuccessFactors versions with mobile applications are impacted.

💻 Affected Systems

Products:
  • SAP SuccessFactors
Versions: Specific versions not publicly detailed in references; consult SAP notes for exact affected versions
Operating Systems: Not OS-dependent; affects SAP SuccessFactors cloud service
Default Config Vulnerable: ⚠️ Yes
Notes: Affects mobile application APIs for Time Off, Time Sheet, EC Workflow, and Benefits modules

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers with user accounts gain full administrative control over attachment data, allowing unauthorized access to sensitive HR documents and manipulation of critical business records.

🟠

Likely Case

Privileged users or compromised accounts escalate privileges to access and modify attachments they shouldn't have permission to view or edit.

🟢

If Mitigated

With proper access controls and monitoring, unauthorized activities are detected and prevented before significant damage occurs.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires valid user credentials but minimal technical skill to exploit once authenticated

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply SAP Security Note 3226411

Vendor Advisory: https://launchpad.support.sap.com/#/notes/3226411

Restart Required: No

Instructions:

1. Log into SAP Support Portal
2. Download and apply SAP Security Note 3226411
3. Verify the patch is applied through SAP SuccessFactors administration console

🔧 Temporary Workarounds

Disable affected mobile APIs

all

Temporarily disable the vulnerable attachment APIs in mobile applications until patch is applied

Restrict mobile application access

all

Limit mobile application access to trusted networks and implement additional authentication requirements

🧯 If You Can't Patch

  • Implement strict access controls and monitoring for attachment APIs
  • Disable mobile application features for affected modules until patching is possible

🔍 How to Verify

Check if Vulnerable:

Check if SAP Security Note 3226411 is applied in your SAP SuccessFactors instance

Check Version:

Check SAP Note application status in SAP Support Portal or administration console

Verify Fix Applied:

Verify patch application through SAP SuccessFactors administration console and test that user accounts cannot perform admin actions on attachments

📡 Detection & Monitoring

Log Indicators:

  • Unusual attachment access patterns from user accounts
  • Multiple attachment operations from single user in short time
  • Attachment access outside normal business hours

Network Indicators:

  • API calls to attachment endpoints with privilege escalation patterns
  • Mobile application traffic showing administrative actions from non-admin users

SIEM Query:

source="sap_successfactors" AND (event_type="attachment_access" OR event_type="attachment_modify") AND user_role="standard_user" AND action="admin_privilege_action"

🔗 References

📤 Share & Export